{"affected":[{"ecosystem_specific":{"binaries":[{"glibc-devel-static":"2.22-114.34.1","glibc-info":"2.22-114.34.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-114.34.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.22-114.34.1","glibc-32bit":"2.22-114.34.1","glibc-devel":"2.22-114.34.1","glibc-devel-32bit":"2.22-114.34.1","glibc-html":"2.22-114.34.1","glibc-i18ndata":"2.22-114.34.1","glibc-info":"2.22-114.34.1","glibc-locale":"2.22-114.34.1","glibc-locale-32bit":"2.22-114.34.1","glibc-profile":"2.22-114.34.1","glibc-profile-32bit":"2.22-114.34.1","nscd":"2.22-114.34.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-114.34.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.22-114.34.1","glibc-32bit":"2.22-114.34.1","glibc-devel":"2.22-114.34.1","glibc-devel-32bit":"2.22-114.34.1","glibc-html":"2.22-114.34.1","glibc-i18ndata":"2.22-114.34.1","glibc-info":"2.22-114.34.1","glibc-locale":"2.22-114.34.1","glibc-locale-32bit":"2.22-114.34.1","glibc-profile":"2.22-114.34.1","glibc-profile-32bit":"2.22-114.34.1","nscd":"2.22-114.34.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-114.34.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glibc fixes the following issues:\n\n- nscd: Fixed use-after-free in addgetnetgrentX (BZ #23520)\n- CVE-2024-33599: nscd: Fixed Stack-based buffer overflow in netgroup cache\n  (bsc#1223423, BZ #31677)\n- CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response\n  (bsc#1223424, BZ #31678)\n- CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX\n  (bsc#1223424, BZ #31678)\n- CVE-2024-33602: netgroup: Use two buffers in addgetnetgrentX (CVE-2024-33601,\n  bsc#1223425, BZ #31680)\n- CVE-2024-33602; Use time_t for return type of addgetnetgrentX (bsc#1223425)\n- CVE-2024-2961: iconv: ISO-2022-CN-EXT: Fixed out-of-bound writes when writing escape sequence (bsc#1222992)\n","id":"SUSE-SU-2024:1675-1","modified":"2024-05-17T07:52:49Z","published":"2024-05-17T07:52:49Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241675-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223425"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2961"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-33599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-33600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-33601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-33602"}],"related":["CVE-2024-2961","CVE-2024-33599","CVE-2024-33600","CVE-2024-33601","CVE-2024-33602"],"summary":"Security update for glibc","upstream":["CVE-2024-2961","CVE-2024-33599","CVE-2024-33600","CVE-2024-33601","CVE-2024-33602"]}